1/122
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Which violation of a trademark occurs when the mark is portrayed in a negative or compromising way?
A. Infringement
B. Unfair competition
C. Blurring
D. Tarnishment
Tarnishment
argued that property was an expression of one's personality, a means of self-actualization.
A. Hegel
B. Locke
C. Cohen
D. Moore
Hegel
True or False? Copyright law does not give the copyright holder the right to prepare derivative works based upon the copyrighted work.
False
Copyright laws allow for _____ where copyrighted literary works can be quoted and a small segment of a video work can be displayed for limited purposes such as classroom instruction.
fair use
To be eligible for a(n) the invention must be a process, machine, or composition of matter that is unknown or unused by others before being awarded.
patent
T/F: The National Foundation Copyright Act criminalizes the use of technologies that circumvent technical protection systems such as an encryption program.
False
T/F: Kant argues that users should be given broader fair use rights in order to blunt the encroachment of a permission culture.
False
T/F: Intellectual property rights last for 30 years after the author has passed away.
False
T/F: Consumers can engage in fair use, a process of making a copy of a song to listen to at another time.
False
T/F: Unfair competition occurs when the trademark is portrayed in a negative or compromising way.
False
True or False? Parody of trademarks is permitted as long as it is not closely connected with commercial use.
True
The Copyright Term Extension Act extends the term for copyright protection another _____ years.
20
An issue that had not been fully addressed in prior acts, but was singled out in the Digital Millennium Copyright Act, is the _____ liability, the liability of third parties for copyright infringement of others.
intermediary
To state the _____ theory more simply, we should provide enough intellectual property protection to serve as an inducement for future innovation.
utilitarian
Which of the following is not an example of intellectual property?
A. Original music compositions
B. Novels
C. Ideas
D. Product formulas
Ideas
T/F: Copyrights now last for an author's lifetime plus 70 years.
True
Creating a program to unscramble a DVD file's encryption protection system so a user can copy the movie to a computer hard drive is a violation of the:
A. Communications Decency Act.
B. Online Protection Act.
C. Digital Millennium Copyright Act.
D. Copyright Term Extension Act.
Digital Millennium Copyright Act.
True or False? According to Stallman, the patent and copyright protection regime interferes with the evolution and incremental improvement of software products. Therefore, it causes an enormous disincentive and keeps users from enjoying many popular programs.
True
True or False? The open source code approach leads to the development of better software code, and in recent year many major software vendors are making their code more openly accessible.
True
is software such as Adobe's Acrobat Reader that is distributed with the source code at no charge.
Freeware
A(n) _____ license allows a user to redistribute the open source code with modifications or enhancements, but only under the same open source license under which that user received that code.
copyleft
_____ is a combination of what rights (to use, copy, or edit) users of the work will have.
A. The Communications Decency Act
B. The Digital Millennium Copyright Act
C. The Cyberspace Rights Act
D. Digital rights management
Digital rights management
Which of the following is a problem with digital rights management?
A. Fair use conflicts with trusted systems
B. Invasions of privacy
C. Creative works may be less accessible
D. All of these are correct.
All of these are correct.
T/F: It is legal to make extra copies of MP3 files as backups and distribute them to friends.
False
T/F: Given the large number of patents, it is difficult for innovators to know when or if they have inadvertently infringed on a competitor's patent.
True
T/F: A freeware license allows a user to redistribute the open source code with modifications or enhancements, but only under the same open source license under which that user received that code.
False
True or False? A supernode is a user computer selected by the software provider that has enough power to store the index of available music and provide search capabilities.
True
True or False? The State Street case provided grounds for giving business methods a patent for being novel and nonobvious, which then made it possible for software-enabled businesses to receive patents.
True
Because MP3 files are unsecured, they can be distributed easily through the internet and lead to the potential for , the illegal copying and distributing of music.
piracy
When someone registers a domain name like googlesucks.com, the practice is referred to as _____.
cyber griping
Because many of the new business patents were for online business methods, they became known as
Cyberpatents
A prominent technology that gives content providers enhanced control over their material is known as , where content providers distribute work in cyberspace in an encrypted form accessible only by users with this type of hardware or software.
trusted systems
T/F: P2P software gets around copyright infringement because it uses a functionality called uploading from a database stored in a supercomputer.
False
T/F: Software is a functional form of intellectual property that cannot be protected by a patent or copyright.
False
Gavison defines privacy as all of the following, except:
A. secrecy.
B. anonymity.
C. free will.
D. solitude.
free will.
True or False? Natural privacy means that if you are sitting in a secluded island off the coast of a continent and someone discovers you, you have lost your privacy, but you couldn't reasonably claim that your privacy rights have somehow been violated.
True
Individuals need over their personal data to ensure restricted access to it.
Control
Which element of privacy refers to protection from undesired attention?
A. Secrecy
B. Anonymity
C. Free will
D. Solitude
Anonymity
T/F: Privacy is defined as a condition or state of limited accessibility.
True
T/F: Privacy in cyberspace is tricky because a person who wants privacy is seeking restricted access, but that condition no longer exists when someone observes them or otherwise intrudes upon their private space.
True
T/F: The concept of privacy and the normative justification for a right of privacy are the same concepts.
False
True or False? Online databases should exclude vital information such as social security numbers, but not personal identities such as mother's maiden names.
False
T/F: Internet databases purge data 15 years after it has been posted to prevent overloading of the internet's supercomputers.
False
T/F: Businesses would greatly benefit from building databases because court records and other public records have been digitized and made available on the Web.
True
T/F: A major issue concerning the government making public records such a court records available on the internet is that others can then access this highly sensitive material without owner knowledge or consent.
True
T/F: Hypothetically, because public records are posted on the internet, you could find out major facts about someone you work with without their knowledge within 15 minutes.
True
True or False? Electronic commerce transactions are particularly problematic because they often leave a revealing trail of personally identifiable information, including one's name, address, email address, and phone number.
True
True or False? It is illegal for online sites to sell demographic data such as one's age or gender to marketers.
False
A(n) _____ is placed across a network of related sites so that users' movements can be tracked not just within a certain site but within any site that is part of this network.
Third party cookie
T/F: Acxiom Corp. is an information service provider that has a database of information on 103 million people in the United States, which they sell to junk mail vendors for 25 cents a name.
False
T/F: Facebook can track a user's online movements even when the user is not logged in to Facebook.
True
_____ are small data files that are written and stored on the user's hard disk drive by a website to track the user when the user visits that site.
Cookies
The _____ approach for protecting consumer privacy is when individuals explicitly approve secondary uses of their personal data.
Opt-in
This type of tracking system is installed on a user's computer and can track a web surfer's location and online activities.
A. Beacon
B. Cookie
C. Tor
D. Regulator
Beacon
What is the primary objective behind private data collection and surveillance?
A. Targeted marketing
B. Personalized advertising
C. Government surveillance
D. Targeted marketing and personalized advertising
Targeted marketing and personalized advertising
T/F: Corporations such as Metromail search public records both on and offline to build "Big Data" dossiers on consumers such as the make and model of their cars.
False
T/F: It is illegal to create apps for smartphones and other mobile devices to gather data and then sell that data to marketers.
False
This type of controversial tracking system, a(n) , is placed across a network of related sites so that the movements of users can be tracked not just on the initial site but on all related sites of that network.
third-party cookie
T/F: When you shop at a store such as Sears, and use your Sears card, purchase data is sent to producers showing your shopping habits so they can plan marketing campaigns.
True
T/F: The collection, aggregation, and analysis of information to sell to marketers is known as Big Data.
True
True or False? The sale of motor vehicle record information to third parties was a lucrative business for many states.
True
True or False? A key piece of the Health Insurance Portability and Accountability Act is the restriction to limit the disclosure of health information to the minimum necessary for a specific purpose such as paying bills.
True
The Federal Trade Commission is responsible for enforcing the _____, which regulates and restricts disclosures of credit and financial information by credit bureaus.
A. Right to Financial Privacy Act
B. Digital Rights Management Act
C. Direct Marketing Act
D. Fair Credit Reporting Act
Fair Credit Reporting Act
Congress passed the ___, which forbids websites from collecting personal information from children under age 13 without parental consent.
A. Communications Decency Act
B. Children's Online Privacy Protection Act
C. Children's Internet Protection Act
D. Children's Online Protection Act
Children's Online Privacy Protection Act
In this landmark court case involving the dissemination of birth control information, the Justices agreed that privacy was a right so rooted in the traditions and conscience of our people as to be ranked as a fundamental right.
A. MGM v. Grokster
B. Universal City v. Remeirdes
C. Alice Corp. Ltd v. Maryland
D. Griswold v. Connecticut
Griswold v. Connecticut
T/F: The United States uses targeted regulations that protect privacy rights in certain sectors such as health care instead of comprehensive laws.
True
T/F: According to the Federal Trade Commission, a consumer's credit report should be released or provided to a third party only in response to a court order, in response to a written request from the consumer who is the subject of the report, or in response to responsible third parties who intend to use the information.
False
True or False? In contrast to the constitutions of most European states, there is no right to privacy in the U.S. Constitution.
True
advocates "just aggregation" principles that would preserve the "spatial disconnects" that separate one context from another.
A. Nissenbaum
B. Cohen
C. Rosen
D. Moor
Cohen
_____ states that the recipients of digital information matter—it makes a big difference whether you share information with a neighbor, a group of friends, colleagues at work, or a data broker who can recombine that data with other information.
A. Nissenbaum
B. Cohen
C. Rosen
D. Moor
Nissenbaum
T/F: Digital information is the currency of the new economy, and there is too much market incentive to commoditize information even when privacy may be compromised.
True
T/F: Because of the culture and political traditions, Europe does not like the idea of blunt solutions for regulating privacy on the Web.
False
True or False? It is illegal for companies to monitor their employee's incoming and outgoing email.
False
True or False? The main difference between Europe and the United States regarding employee privacy is the U.S. weighs the value of privacy against other concerns and Europe values human dignity.
True
_____ has a Workers Statute that "prohibits remote surveillance of workers by video camera or other devices," unless agreed to by the union for the sake of a business necessity; even then, a worker has the right to challenge the surveillance.
A. Germany
B. Italy
C. France
D. England
Italy
T/F: The internet has played a key role in allowing corporations to expedite the interorganizational communication and data flows.
True
T/F: Some employers check the whereabouts of their employees through electronic monitoring and maintain health surveillance databanks.
True
_____ is when an email is sent to a user that looks authentic but takes them to a link where they are asked to enter sensitive personal information.
Phishing
T/F: The Stuxnet worm is a popular form of malware used to insert corrupt information into a computer.
False
T/F: The famous Stuxnet worm undermined North Korea's Nuclear Research program.
False
T/F: What makes the Net such an easy tool for terrorists is that the Net's underlying architecture is a radically open one, designed to share information and not to conceal it.
True
A(n) is a self-replicating program usually hidden away in another host program or file that can disrupt a computer.
Virus
_____ travel automatically from one computer to another across network connections.
Worms
All of the following are categories of cybercrime, except:
A. computer sabotage.
B. electronic break-ins.
C. software piracy.
D. privacy violations.
privacy violations.
The Pentagon's Joint Strike Fighter project was a cybercrime act that fell into which category?
A. Computer sabotage
B. Electronic break-ins
C. Software piracy
D. Privacy violations
Electronic break-ins
The two types of malware that form ransomware are the designed to spread from one computer to another and the _____ that is delivered by it. Note: Separate the two answers with a semicolon (;).
worm; encrypting software
T/F: Computer-related crimes are ones committed with cybertechnology and fall into categories of fraud, swindling, or embezzlement.
True
Which ransomware program affected 230,000 computers within 48 hours, including those at large companies and government agencies?
A. Strike Fighter
B. WannaCry
C. Mr. Dotcom
D. Osiris
WannaCry
T/F: The No Electronic Theft Act of 1997 involves the unauthorized distribution of computer parts.
False
T/F: The No Electronic Theft Act of 1997 forbids the willful infringement of a copyright for purposes of commercial advantage or for some financial gain.
True
T/F: A denial-of-service attack is when computers link up and steal user names and passwords from around the world and switch them with other users.
False
_____ involves the unauthorized duplication of proprietary software and the distribution or making available of those copies over the network.
Software piracy
True or False? The process of solving social problems with technology must be firmly guided by government regulations, and in the case of music or video, an awareness of the consumer's right to make backup copies or to use a piece of content on diverse platforms (a Mac computer system, an iPhone, etc.).
False
Embedded in iTunes is a Digital Rights Management tool called that limits the distribution of iTunes music.
fairplay
T/F: The government responded to Hollywood's request to protect their products by passing new laws forbidding the creation, sale, or distribution of any interactive device that does not include and utilize certified security technologies.
True
T/F: The success of the music tool MP3.com restored confidence to the music world that digital music can still be successfully distributed through traditional market mechanisms.
False
True or False? A combination of law and code in Mac and PC device designs forbidding the copying of music and videos is an inexpensive fix that will stop all forms of piracy.
False
T/F: Hollywood and the music content industry are frustrated that coders have not found a copyright protection code to prevent bootlegging of their products.
True
True or False? It is a state-statute crime to cause the transmission of a program or piece of code that intentionally causes damage to a protected computer.
False
A(n) _____ combines hacking and political activism.
hacktivist